|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn679602977 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
101108s2009 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CEF
|d OCLCQ
|d E7B
|d DEBSZ
|d MERUC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d COO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d AU@
|d UKAHL
|d VT2
|d CNCEN
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1058050982
|a 1103265680
|a 1129331318
|
020 |
|
|
|a 1905356870
|
020 |
|
|
|a 9781905356874
|
020 |
|
|
|a 9781905356867
|
020 |
|
|
|a 1905356862
|q (Trade Paper)
|
020 |
|
|
|z 9781905356874
|
024 |
3 |
|
|a 9781905356867
|
029 |
1 |
|
|a AU@
|b 000051371329
|
029 |
1 |
|
|a DEBSZ
|b 35545078X
|
029 |
1 |
|
|a HEBIS
|b 291520669
|
035 |
|
|
|a (OCoLC)679602977
|z (OCoLC)1058050982
|z (OCoLC)1103265680
|z (OCoLC)1129331318
|
037 |
|
|
|a CL0500000077
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.888
|b .H69 2009
|
082 |
0 |
4 |
|a 004.678
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a How to use Web 2.0 and social networking sites securely /
|c IT Governance Research Team.
|
260 |
|
|
|a Ely, U.K. :
|b IT Governance Pub.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (75 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION; CHAPTER 1: WEB 2.0 THREATS; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES; Pocket Guides; Toolkits; Best Practice Reports; Training and Consultancy.
|
520 |
|
|
|a Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Web 2.0.
|
650 |
|
0 |
|a Online social networks.
|
650 |
|
0 |
|a Technological innovations
|x Security measures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Web 2.0.
|
650 |
|
6 |
|a Réseaux sociaux (Internet)
|
650 |
|
6 |
|a Innovations
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Web 2.0.
|2 blmlsh
|
650 |
|
7 |
|a Online social networks.
|2 blmlsh
|
650 |
|
7 |
|a Technological innovations
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
650 |
|
7 |
|a Online social networks.
|2 fast
|0 (OCoLC)fst01741311
|
650 |
|
7 |
|a Web 2.0.
|2 fast
|0 (OCoLC)fst01743925
|
710 |
2 |
|
|a IT Governance (Organization).
|b Research Team.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781905356867/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26066622
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10496551
|
994 |
|
|
|a 92
|b IZTAP
|